3-4 paragraphs

 

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

prepare presentation slides and notes

By looking at this following project proposal and Gantt chart please prepare the power point slides and notes. 

topic to be included in PowerPoint slides and notes

1) Methodology 

2) Team Building

3) work breakdown structure

4) Time/ schedule (Gantt chart)

5) deliverables

prepare the power point slides on those following topics   

Assignment 7 on Chapter 8 Step

  

Assignment 7 on Chapter 8 Step 1: Write the class declaration for class Square that has a private instance variable side of type double and a no-argument constructor that sets the side to 1.0 by calling a method named setSide that you will declare in step 2. Step 2: Write a method setSide for the class you defined in step1. Set the side variable to the argument of the method. Also make sure that the side is not less than 0.0. If it is, keep the default setting of 1.0. Step 3: Write a method getSide for the class you modified in step2 that retrieves the value of instance variable side. Step 4: Define another constructor for the class that takes one argument, the side, and uses the Square’s set method to set the side. Step 5: Write a method computeArea for the class that computes the area of a Square. Step 6: Define a toString method for the class that will return a String containing the value of side and the area of the Square.

3 discussions and 3 case studies

Discussion 5.1 ( Executive leadership)

How has the COVID-19 pandemic changed and affected the way day-to-day business operations are conducted? What are some of the lesson’s learned and experienced gained during the pandemic that enhance future business and company operations? Cite your reference for opinionated support. 

Discussion 5.2 (Computer Forensic)

Some virtual machines can be loaded on a USB drive. Research which type 2 hypervisors fit on a USB drive of less than 16 GB. Which OS and forensics tools could you load on this drive?

Discussion 5.3 ( Computer Forensic)

Your company wants to send a working VM to customers with a sample of its new software, but you’re concerned about the security of the software and data. What precautions can you take?

Case Study 5.1 ( Computer Forensics)

As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (not including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1. Make sure you follow the grading rubric and write your paper in APA format.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 5.2 ( Executive Leadership)

Due: Sunday, End of Module by 11:55 p.m. EST

Address the four questions associated with the chapter seven Opening Case Application: Mark Zuckerberg – Facebook Founder and CEO on page 231 in a three to five page paper (excluding title, abstract, and reference pages). Completely review the company website noted in the case. Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment must be in 7th edition APA compliance. 

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Case Study 4.1 ( Computer Forensics)

Apple vs. FBI Case Study

Was Apple wrong for not complying with the FBI’s request? If so, why?  If not, why not?

What ethical issues are involved in this case?

Who are the stakeholders in this situation?

Apple’s values are listed on the bottom of its home page at apple.com. Is the company’s decision consistent with its values?  Is that important?

Complete individual paper and presentation on the FBI vs. Apple Case Study

Reference:
Apple vs. FBI Case Study (2016).  https://www.scu.edu/ethics/focus-areas/business-ethics/resources/apple-vs-fbi-case-study/ ;

Writing Requirements: 

  • 5-6 page paper in APA format, for citations and references
  • Use the APA template located in the Student Resource Center to complete the assignment.
  • Use smarthinking.com tutoring service to improve your paper

PowerPoint_1G_Northern_Lights

 

PowerPoint_1G_Northern_Lights

 

#PowerPoint_1G_Northern_Lights

#PowerPoint 1G Northern Lights

Open   the file Student_PowerPoint_1G_ Northern_Lights.pptx downloaded with this project.

Replace all occurrences of the   text North with Northern and then change layout of Slide   1 to Title Slide.

Apply the Ion theme with the   second, blue variant to the presentation.

Change the Slide Size to   Widescreen (16:9).

Display Slide 2, open the Reuse   Slides pane, and then from your downloaded files browse for and display the   presentation p01G_Slides.pptx. If   necessary, clear the Keep source formatting check box, and then insert the   last two slides.
   Note, Mac users, after importing the slides, delete Slide 3-Alaska Slides

Display Slide 2. In either the   slide pane or in the slide outline,  click at the end of the first bullet   point after the word time. Press   SPACEBAR. Add the words for viewing and then in the same slide, increase the list   level of the second and third bullet points.
 

With Slide 2 still displayed,   select the title and change the Font Size to 32. In the Notes pane, type the   following notes: The lights reach their peak in September and March. Be sure to type the period at   the end of the sentence.
 

Display Slide 3. Select the   paragraph of text, and then change the  Font Color to in the last column, the   third color. Change the Font  Size to 16, and then apply Bold.

In the same paragraph, change the Line Spacing to 1.5, and then   center the paragraph and the slide title.

With Slide 3 still displayed,   format the picture with the Soft Edge Rectangle picture style and the Marker   artistic effect.

Display Slide 4. In the content placeholder on the right, from your   downloaded files, insert the picture p01G_Lights.jpg.   Apply the Reflected Rounded Rectangle picture style.

Move Slide 3 between Slides 1   and 2.
 

Display Slide 4. Insert a New   Slide with the Section Header layout. In the title placeholder, type Visit   Fairbanks and View the Northern Lights! In the text placeholder type With Kodiak   West Travel

Apply the Uncover transition and   change the Effect Options to From  Top. Change the Timing by increasing the   Duration to 01.25. Apply the  transition effect to all of the slides.

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, a Footer with  the text 1G_Northern_Lights and then apply to all the   slides.

Display the Document Properties.   Type northern   lights, Fairbanks   as the Tags.
   Note—Mac users use the Keywords box.

Can someone help me

 Chapter 3: Requirements and analysis. This should state, in a more detailed way, the  objectives of the project by requirement and the analysis should break the problem down into  manageable steps. There may be more than one suitable approach; the analysis may cover more  of the area than is finally implemented. Suitable diagram-techniques (e.g. UML, other drawings)  should be used where appropriate. If a method is applied selectively, explain which parts were  used and why. Experimental projects should pay careful attention to control conditions, samples  selected, etc. to ensure a valid result. Testing and evaluation should be given due consideration.  It is important that you state how you will evaluate your work. For a design project it is  appropriate to consider testing at the same time as specification. 

The Security Program Assignment

The security program has been a huge success. Several of the PCS government clients have expressed their appreciation and increased confidence in the company’s ability to protect their program data and assets. Your company is now in the continuous monitoring phase and your information security analysts are performing routine assessments on the servers and workstations.

Based on your research for Unit 8:

  • Describe the importance of assessments in system and application security.
  • Describe some of the major challenges with this area of security and address why the job is never done.
  • Review the results of the vulnerability scan provided by one of your analysts for a client’s system. Explain ten of the failures found on the client system and how the PCS security program prevents these problems on the corporate network.
  • Conclude by discussing the relationship between assessments and the importance it has in continuous monitoring.

The requirements for your assignment are:

  • 1-2-page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Lab 7

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Must be 100% original work. no plagiarism. 

Please complete Lab #7 Assessment Worksheet, Part A – BIA of business functions and operations and Lab #7 – Assessment Worksheet, Part B – Business Impact Analysis Executive Summary attached.